On Sun 17/Sep/2023 18:58:05 +0200 Ángel via mailop wrote:
On 2023-09-15 at 10:26 +0200, Alessandro Vesely via mailop wrote:
I get this language, on forwarding:

Remote-MTA: dns; gmail-smtp-in.l.google.com [74.125.71.27]
Diagnostic-Code: smtp; 550-5.7.26 Unauthenticated email from intesasanpaolo.com 
is not accepted due to
         550-5.7.26 domain's DMARC policy. Please contact the administrator of
         550-5.7.26 intesasanpaolo.com domain if this was a legitimate mail. 
Please
         550-5.7.26 visit
         550-5.7.26  https://support.google.com/mail/answer/2451690 to learn 
about the
         550 5.7.26 DMARC initiative. 
t16-20020a05600c451000b003fee9453d8csi1042282wmo.59 - gsmtp

MAIL FROM was rewritten so as to pass SPF.  ARC sealing the message
provided no benefit except checking, from the bounce, that the body
hash in AMS matched the one on the original DKIM signature, which had
passed.  The message was legitimate and none of the signed headers,
h=date:from:to:cc:message-id:subject:mime-version:content-type was
altered.  Why should I contact the administrator of the original
sender?

If this message came directly from intesasanpaolo.com (i.e. intesasanpaolo.com was sending through tana.it server but not listing it on
their SPF), that's something to the administrator of intesasanpaolo.com
could be interested in.

The bank is sending to a user of mine who asked me to forward messages to her gmail account.


The DKIM pass should have been enough, though...


Comparing the bounced message with the original, it turned out the angle brackets were removed from the From: address, which is legal since there was no display-name, but breaks signatures. Still no idea how that happened.


Best
Ale
--





_______________________________________________
mailop mailing list
mailop@mailop.org
https://list.mailop.org/listinfo/mailop

Reply via email to